An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-11-09 13:15
Updated : 2022-11-23 05:59
NVD link : CVE-2021-26360
Mitre link : CVE-2021-26360
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
amd
- radeon_pro_w6800x
- radeon_pro_w6800
- radeon_rx_6650m_xt
- radeon_rx_6950_xt
- radeon_rx_6500_xt
- radeon_rx_6600
- radeon_rx_6700_xt
- radeon_rx_6800m
- radeon_pro_w6600x
- radeon_software
- radeon_rx_6600_xt
- radeon_rx_6800s
- radeon_rx_6800
- radeon_pro_w6900x
- radeon_pro_w6600m
- enterprise_driver
- radeon_rx_6800_xt
- radeon_rx_6650m
- radeon_pro_w6600
- radeon_pro_w6400
- radeon_rx_6850m_xt
- radeon_rx_6400
- radeon_rx_6700m
- radeon_rx_6500m
- radeon_pro_software
- radeon_pro_w6800x_duo
- radeon_rx_6300m
- radeon_pro_w6300m
- radeon_rx_6700
- radeon_rx_6600s
- radeon_rx_6650_xt
- radeon_rx_6750_xt
- radeon_rx_6900_xt
- radeon_rx_6700s
- radeon_pro_w6500m
- radeon_rx_6600m